Analysis
-
max time kernel
134s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20/11/2024, 03:59
Static task
static1
Behavioral task
behavioral1
Sample
1305607172931190804.html
Resource
win7-20240903-en
General
-
Target
1305607172931190804.html
-
Size
5KB
-
MD5
5d094669027e56e50927895fc8d7af02
-
SHA1
d46e4ea3964fb70cdc1dc144877de3f650efcc4b
-
SHA256
1af963890a94b022cb3b0fd2276387cf9df618ff4e07f971fa11035325afffc2
-
SHA512
e69088b84ddca4bc9196c8fb973b2a3a65ee10142ebf2a317d8e907cb043e248d7193ac9baa25d177b9e4b459a3d7f0a16ba6a1121e381586a637d0641c53288
-
SSDEEP
96:yUpHE+OfRrcLHLTMRe5mvtgCsXe5oEce0zxzhAnx/IJ:ycHEfRrcb3foVNb0zx1Anx/0
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "438237045" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 408da5b0003bdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea22000000000200000000001066000000010000200000002496248b37b7d458a9d1902fc35df04a9fbe4c21752ac1038dc45202ad1734af000000000e8000000002000020000000d0805e43daf9ce52327d0d5f458836c8ff70e7610124cd44dae53de1c1de30b62000000049ea89c600d6af272eb103fd906ca4052da0f5477eb68803771a477d65a1100f4000000088daf855f57a1777ec480c8d9078e312728297d4baa40f53a6a6eb2d6b4948ae1825b22ee68d51fa529c1d0ec58d700451fab66b5323b935d9276940da6d416f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DC339331-A6F3-11EF-9EA5-F2BBDB1F0DCB} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2348 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2348 iexplore.exe 2348 iexplore.exe 2328 IEXPLORE.EXE 2328 IEXPLORE.EXE 2328 IEXPLORE.EXE 2328 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2348 wrote to memory of 2328 2348 iexplore.exe 30 PID 2348 wrote to memory of 2328 2348 iexplore.exe 30 PID 2348 wrote to memory of 2328 2348 iexplore.exe 30 PID 2348 wrote to memory of 2328 2348 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\1305607172931190804.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2348 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2328
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b51bed668b4ee6af5afb8edbb2ecc99
SHA1d0cc268968e5976b2d4728cbead50d0f5ac8e015
SHA2560e9ab8822cf3e51d259a0e752de827cfc3bf4c1f3ac9f4e74e5742c637d74201
SHA512672be2c5bb651c3c9b8f35cea5255a7e386323e095d915eb38f9ee303c177f905404157cfc2829f195cbd0fa294979a0e7fc3628fddd639fe33a2080250a1c91
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD548b51994ab9cadd74b036ad02b5a3a9c
SHA1de890ef90d23817c61868a70bba300e72a97c9f4
SHA25608b6d029281141512a69c54eb2f7f33726de4ceb637ab0c6aac976df08635017
SHA5122b6e380ca7d98f14502330f92fac4392499b04143816ed2c9a65e084de238b8e4a974e28121c377bd312b0bbdbfa15c57bb926b5def62f310aa2bfd925546f8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD588252ba26857960cbcfd80a2477cc7b0
SHA12bd77a4777c1ab550047707913263166323aa345
SHA2561b642058f89496935a7113f5107dd7e695f0c9322be17a7458244f8d6560a2cb
SHA512386141415040661d5a245a51ef5f7a5aedf843fc5b6d4a13000e804b2aa34ba728a23665bb9fc22f84f93edc0e6ead37a94e06754d69e4f574bf9b570f4f762f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c7ccc0077a68a38614dcb4d27ca8290e
SHA13ddd70d9c8ca7c199153db97517f4522caef75f3
SHA25609c2064bf6fc03c3e847a581f98e7960dd6bd2ff3c5bc0bcb798636ad08ef438
SHA512b838535837706294b0deefa8d00cd504212773fef8baeaddfb7f3ce43b139bd34505237da18633a6cc1bf9efa599a083d275564e7e2017353f30d52f646261dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD590f71e65bd6f84acd30c6e29483f1754
SHA178e207f9bf8e0422c08b36c026cd6f3d2461de7b
SHA25636d67b252b6062adf306d4199b858ddc4fe6df9c8a1797fad0e6b3fe9ef7dfa6
SHA5123fba833179049ba808e46b0d3da120f59355443e49ea7d536b92e7cbea7aeea900c4caebb8841bcfe3de1d509abd0658726eb44a982d78ed001e0bec5256ba20
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5543c0d196e9f46bedb973c6011b051b8
SHA138d18c01141fa659f4a9df38388061041e50acfa
SHA256f3357a4a99f32a23bd7f99ef691c16ea53b10c5267dea8446e2fb737eead4a16
SHA5122d422ee19fb6f2944a5a7a9aeaf198792a93f67e7795a7b5e93a4dedd10104eb4f68d814bbdb62297985a8568eedc5b28396e5354f286bba8e17f1380016ca90
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5918702ad403a848109bbb993adbb9a05
SHA1a73b0fafc326cd46d1b78f30712fb6e7da192e99
SHA2563a6d888cf97f427a943b9e5caba4dc2691e22303157ab2667fdae29d3a4d6869
SHA5124554f5c37394946231e16ab70c166d584a38c96937889e7e332e80869881bcbf00555bdb750ce4a7c9b4077b519706493b110c431e76526c345ba8dcf6b27126
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55f7f54370389fae7ed0796a37af151d9
SHA180d884fae85f6c089a73b650c3ab12866c8222e1
SHA256f33d4ac380f9aaedfb0527068595ca125811dbad8f2edc933dd39b261a927447
SHA5120e21e5201e6538e112cfdb0db70d417f7ed11df17a335be3c8b4ac991f59051ea2a63c67139a72502c116c7b0c060a7178bf3c61b4d2282543ad4e80f9055946
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e5386a9bc78a82db86277228f2568e88
SHA12a5fc52f1271beacb4e0d5032a1c8110aa3981d7
SHA256e555893caf7f105e5f1057b949133d6451c513c3cb698e10fb2cfc6509de046f
SHA512b44e1fd3ae291b2a085c1b66f2afc26786b862ae7b4af8026c0bc411a5d04811615efb6a64ff9f73d75124de4f2d095604321da93acb617b4f567bc596cde6c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD539556143434138c22feaad63492c8e43
SHA16780fc2073070dea3088eb7223794c3d5626991a
SHA2563451d70706319e62cae610bdf24df4c10a14ee5519edbd41f1051af808a22905
SHA51240b1daa2aca0e3d1e8bee90b21e524b5d1b7367cb73f4635033895014677960e8ed63664cda613036b1c8808e0fd1da76b9d4955b32b5ad75794650a172c7eed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb63f6f23572e7dc80905bda3e278414
SHA19bc3971b422b1b22297379676326150ffe93a565
SHA25677b214c5a2430238c94c0e0be92ecd39020cf2adfde943bbe777b21e9a736bc7
SHA5128e7bea4c0d935d2c0648cea402a7384b8979da44b1c442d8d7fe3eb852b716a8994e9afd3bc226972d0c90da341ca2727dcb772b8ea1604ecfd0d6076af1c76e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cfd4d03e631919c9af0e38344c69e8de
SHA1bae10782cf05fea98d0341097e78dfe61c5655d4
SHA256ddbeca64d0367268f8cb0658cb1bbf6a809b2233d9fadc644a4862b6ab07451f
SHA5122e09c834340a5e019baef1d8889394bd28fc35f62407b495560af807f90724a5cdad7673aa73eee35a6da0e155bb4f82bb32eb7df25adbe5fec1d2f8767e6dcb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5660e934619e0290eba1d9be2f7d38ed8
SHA142d98aad49179e165a85bdffc3bbb90658368940
SHA256968b186e3fe5a132f880b5c5f2eac7cf8ed13142ba80d66ead2d0c85d9dd673b
SHA51282477a8bafb858e40b7f0b4497fdc2f3a3a482b3568a96725f6f169731f9942a92e50f30dbe034aaa7407d758a2d793f65f502cc27699bcbfe8aaccbd40e3378
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51bac82d368d4f6a237155a0880655206
SHA195b9d0e556effc6d830059b241f3831d9b0bba7d
SHA2560e4444bfdc8b143d6f413de1c2a1178556be3e7fecd30e3c26fb9a0bed21c7c9
SHA5127a2979422b4c872e7c119a8a2b4bc94f0e8158a49f6e32269c72ee9c6c0788c0171cce1ef3b794e56dbe85bf8122d7ec8384ed623be91424f140f7f98c86601a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a2566a8a679ff40d6091b014c0f3c19
SHA1dc35c1123626099aed64b073649131c10e825018
SHA2565e5f11b47bad1346b9a6e807cf822ec157d63a4c4fb80a28cacfda7fba817ddf
SHA5121930c78aa4e14d8287024780396cf5ffb051621c64f565d8fe854dc2ce8962757374478337778de65e58e4a2560bb7b80f51c8e57d8912385a49a7a7247220b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e2e4b7ee1ce7691630b14d4bdaf358b3
SHA139ced766141882e04deea5ed024a4d4af5767f0a
SHA25692a942d729b19d15129cb4d08b9c3696f1d77fa1e56694533a02901b9a3bef2b
SHA5128382621efc0b8b8297cdb787f0069ce68d774430f33d6fbac22c2e4521875a72e56d25e6f208e93f4bd56db35b6e96170d23fb008833e0af03da624cf9c61c5d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b97b102bd9f791860127bf3b0c27b2b4
SHA1db53ed97df1100adc19601b48aa77729249b5c1f
SHA2568f8cd4e62f39e7cd7a41e95f0bf3a250a2a9e35d1aa92f24017dbf9231f6c27d
SHA51276d80dd1bb78e420cc2a6fea18a1800d3ec838d9e0d4814c61597b353a5886fb03fc4c0d4c68d998929d9bded79c1e0f78206449a5377290d755d79795c31adc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a5ff5ec9ab8d8989962d92879d05227f
SHA14102bef5ff825fdc08973611b72c79d8e3c173c7
SHA256495a6cc694f211a71ef66907dcc93de87b1fcd6d346db794c4c8e73e65030e18
SHA51289a1ab951689a24cb2ebcaffbece15456e9e4ba1cf149c6af31dcc499f29d554a77374768c0c7f873d4c67bcf9b7d0a8096999a7f920138dea5fdc3a774df0d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD521deb1d8e5204c47be9ce872fedc6fa9
SHA1df669ee2840a4cb8298949399135be010fd67483
SHA256d7d45c4ca298aa353fa8ce4692fda2552f387e6c112d0365ce0f1ee36a80fb31
SHA51211c211e68c520dd5c223d66d965b1c69c9d46a0cd3b3d39f1873a6f1b24374238aec79c01f4c15d66b8eee9e0291847ddfbc6f903850d677bd83dbd01f2f03ca
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b